Piggybacking Security: How Can You Solve The Problem Of Tag-Along Users? When you offer a key or card security system you’ll already understand the problem of piggybacking. Undoubtedly one of the most abused weaknesses of an automated access control system, this particular structure doesn’t filter the number of people that it grants access to. For… Continue reading Piggybacking Security: How Can You Solve The Problem Of Tag-Along Users?